BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260429T182248Z
DESCRIPTION:New threat research from Eclypsium has revealed a boatload of vulnerabilities affecting cheap KVM (Keyboard, Video, Mouse) devices that are rapidly being deployed in enterprises. KVMs enable remote physical access to sensitive enterprise networks. While heavier-duty, costlier enterprise KVMs have been around for years, the new wave of cheap, single-port KVMs are…wait for it…riddled with vulnerabilities!\nJoin hardware hacker and threat researcher Paul Asadoorian for a thorough discussion of the risks and benefits of KVMs, and how to keep your enterprise safe if you use them.\nWe’ll discuss how attackers can abuse a compromised KVM for:\n- Keystroke Injection\n- BIOS and Firmware modification\n- Evasion of security tooling like EDR and Vuln Management\nAnd we’ll talk about how to stay safe while still reaping the benefits of these handy devices.\n
DTSTART:20260526T170000
DTEND:20260526T180000
DTSTAMP:20260429T182248Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: New Security Research: Vulnerable KVMs Give Attackers Remote Access
TRANSP:OPAQUE
UID:f4f1605d1f0f5654b3d053cf1b96da46 Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
